aboutsummaryrefslogtreecommitdiff
path: root/sys/netinet/tcp_var.h
diff options
context:
space:
mode:
authorAndre Oppermann <andre@FreeBSD.org>2007-03-21 18:05:54 +0000
committerAndre Oppermann <andre@FreeBSD.org>2007-03-21 18:05:54 +0000
commite406f5a1c92bd2b9c849c3b7004bfb61e9471552 (patch)
treea000d55d110721e45de1d87bbc0dd4551a416554 /sys/netinet/tcp_var.h
parent9ac793831b9a8cbd1d3791b089978da1629bf740 (diff)
downloadsrc-e406f5a1c92bd2b9c849c3b7004bfb61e9471552.tar.gz
src-e406f5a1c92bd2b9c849c3b7004bfb61e9471552.zip
Remove tcp_minmssoverload DoS detection logic. The problem it tried to
protect us from wasn't really there and it only bloats the code. Should the problem surface in the future we can simply resurrect it from cvs history.
Notes
Notes: svn path=/head/; revision=167772
Diffstat (limited to 'sys/netinet/tcp_var.h')
-rw-r--r--sys/netinet/tcp_var.h5
1 files changed, 0 insertions, 5 deletions
diff --git a/sys/netinet/tcp_var.h b/sys/netinet/tcp_var.h
index 6dc20d4e26ce..07704128dc35 100644
--- a/sys/netinet/tcp_var.h
+++ b/sys/netinet/tcp_var.h
@@ -186,10 +186,6 @@ struct tcpcb {
tcp_seq snd_recover_prev; /* snd_recover prior to retransmit */
u_long t_badrxtwin; /* window for retransmit recovery */
u_char snd_limited; /* segments limited transmitted */
-/* anti DoS counters */
- u_long rcv_second; /* start of interval second */
- u_long rcv_pps; /* received packets per second */
- u_long rcv_byps; /* received bytes per second */
/* SACK related state */
int sack_enable; /* enable SACK for this connection */
int snd_numholes; /* number of holes seen by sender */
@@ -493,7 +489,6 @@ extern struct inpcbinfo tcbinfo;
extern struct tcpstat tcpstat; /* tcp statistics */
extern int tcp_mssdflt; /* XXX */
extern int tcp_minmss;
-extern int tcp_minmssoverload;
extern int tcp_delack_enabled;
extern int tcp_do_newreno;
extern int path_mtu_discovery;